Vol. 6 No. 05 (2026): Volume 06 Issue 05
Articles

A Practical Blockchain-Based Authentication Approach for Secure IoT Systems Using Spatial Verification

Seidullayev M.K.
Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Uzbekistan

Published 2026-05-11

Keywords

  • Internet of Things (IoT),
  • Blockchain Security,
  • IoT Authentication

How to Cite

Seidullayev M.K. (2026). A Practical Blockchain-Based Authentication Approach for Secure IoT Systems Using Spatial Verification. Stanford Database Library of American Journal of Applied Science and Technology, 6(05), 49–52. Retrieved from https://oscarpubhouse.com/index.php/sdlajast/article/view/2127

Abstract

With the rapid growth of the Internet of Things (IoT), ensuring secure communication between devices has become one of the most critical challenges in modern networks. Many existing solutions focus only on identity-based authentication, which is often insufficient against more advanced attacks such as spoofing or location-based intrusions. In this work, a new authentication model is proposed that combines blockchain technology, spatial verification through angular distance, and lightweight hybrid cryptography.

The idea behind this approach is simple but effective: instead of trusting a device only based on its identity, the system also verifies where the device is located. At the same time, blockchain is used to store authentication records in a secure and tamper-resistant way, while smart contracts automate the decision-making process. Simulation results show that the proposed method performs reliably even as the number of devices increases, while keeping computational and energy costs relatively low. This makes it suitable for real-world IoT environments.

References

  1. Kevin Ashton, “That ‘Internet of Things’ Thing,” RFID Journal, 2009.
  2. Gartner, “Internet of Things Technologies and Market Analysis,” 2020.
  3. Cisco, “Internet of Things Global Report,” 2021.
  4. oneM2M, “Global IoT Standards Initiative Report,” 2022.
  5. Satoshi Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008.
  6. Ralph C. Merkle, “Protocols for Public Key Cryptosystems,” IEEE Symposium on Security and Privacy, 1980.
  7. Vitalik Buterin, “A Next-Generation Smart Contract and Decentralized Application Platform,” 2014.
  8. NIST, “Lightweight Cryptography Standardization Process,” 2023.
  9. Dobraunig, C., Eichlseder, M., and Mendel, F., “Ascon v1.2: Submission to the CAESAR Competition,” 2016.
  10. Hankerson, D., Vanstone, S., and Menezes, A., Guide to Elliptic Curve Cryptography, Springer, 2004.
  11. Dorri, A., Kanhere, S. S., and Jurdak, R., “Blockchain in Internet of Things: Challenges and Solutions,” IEEE Communications Surveys & Tutorials, 2017.
  12. Christidis, K., and Devetsikiotis, M., “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, 2016.
  13. Singh, S., Sharma, P. K., Moon, S. Y., and Park, J. H., “Advanced Lightweight Encryption Algorithms for IoT Devices,” Future Generation Computer Systems, 2019.
  14. Alaba, F. A., Othman, M., Hashem, I. A. T., and Alotaibi, F., “Internet of Things Security: A Survey,” Journal of Network and Computer Applications, 2017.
  15. Internet of Things va blokcheyn asosidagi xavfsizlik tizimlari bo‘yicha zamonaviy ilmiy sharhlar, Springer, 2025.